ID

VAR-200907-0127


CVE

CVE-2009-2305


TITLE

ARD-9808 DVR Card security camera vulnerability in service operation

Trust: 0.8

sources: JVNDB: JVNDB-2009-003572

DESCRIPTION

The ARD-9808 DVR card security camera allows remote attackers to cause a denial of service via a long URI composed of //.\ (slash slash dot backslash) sequences. Armassa ARD-9808 is prone to an information-disclosure vulnerability and a buffer-overflow vulnerability. Successful exploits can allow attackers to obtain sensitive information or to execute arbitrary code in the context of the affected device's webserver. Failed attempts may lead to a denial-of-service condition. ---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: ARD-9808 DVR Card Software Web Server Two Vulnerabilities SECUNIA ADVISORY ID: SA35671 VERIFY ADVISORY: http://secunia.com/advisories/35671/ DESCRIPTION: Two vulnerabilities have been reported in ARD-9808 DVR Card, which can be exploited by malicious people to disclose sensitive information or potentially compromise a vulnerable system. 1) A boundary error in included web server can be exploited to cause a heap-based buffer overflow via an overly long HTTP request. 2) The included web server does not properly restrict access to the dvr.ini file. This can be exploited to disclose e.g. the username and password used to access the camera by downloading the file. SOLUTION: Restrict web access to trusted users only. PROVIDED AND/OR DISCOVERED BY: 1) Stack 2) Septemb0x ORIGINAL ADVISORY: 1) http://milw0rm.com/exploits/9067 2) http://milw0rm.com/exploits/9066 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.98

sources: NVD: CVE-2009-2305 // JVNDB: JVNDB-2009-003572 // BID: 43788 // PACKETSTORM: 78887

IOT TAXONOMY

category:['camera device']sub_category:camera

Trust: 0.1

sources: OTHER: None

AFFECTED PRODUCTS

vendor:armassamodel:ard-9808 softwarescope: - version: -

Trust: 1.4

vendor:armassamodel:ard-9808scope:eqversion:*

Trust: 1.0

vendor:armassamodel:ard-9808 softwarescope:eqversion:*

Trust: 1.0

sources: JVNDB: JVNDB-2009-003572 // CNNVD: CNNVD-200907-043 // NVD: CVE-2009-2305

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-2305
value: HIGH

Trust: 1.0

NVD: CVE-2009-2305
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200907-043
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2009-2305
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: JVNDB: JVNDB-2009-003572 // CNNVD: CNNVD-200907-043 // NVD: CVE-2009-2305

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.8

sources: JVNDB: JVNDB-2009-003572 // NVD: CVE-2009-2305

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200907-043

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-200907-043

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-003572

PATCH

title:Top Pageurl:http://www.armassa.com.tr/

Trust: 0.8

sources: JVNDB: JVNDB-2009-003572

EXTERNAL IDS

db:NVDid:CVE-2009-2305

Trust: 2.8

db:SECUNIAid:35671

Trust: 1.8

db:EXPLOIT-DBid:9067

Trust: 1.7

db:JVNDBid:JVNDB-2009-003572

Trust: 0.8

db:MILW0RMid:9067

Trust: 0.6

db:CNNVDid:CNNVD-200907-043

Trust: 0.6

db:BIDid:43788

Trust: 0.3

db:OTHERid:NONE

Trust: 0.1

db:EXPLOIT-DBid:9066

Trust: 0.1

db:PACKETSTORMid:78887

Trust: 0.1

sources: OTHER: None // BID: 43788 // JVNDB: JVNDB-2009-003572 // PACKETSTORM: 78887 // CNNVD: CNNVD-200907-043 // NVD: CVE-2009-2305

REFERENCES

url:http://secunia.com/advisories/35671

Trust: 1.6

url:http://www.exploit-db.com/exploits/9067

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2305

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-2305

Trust: 0.8

url:http://www.milw0rm.com/exploits/9067

Trust: 0.6

url:http://www.armassa.com.tr/shop/item.php?cid=48798965&id=18984747

Trust: 0.3

url:https://ieeexplore.ieee.org/abstract/document/10769424

Trust: 0.1

url:http://milw0rm.com/exploits/9067

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://milw0rm.com/exploits/9066

Trust: 0.1

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

url:http://secunia.com/advisories/35671/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: OTHER: None // BID: 43788 // JVNDB: JVNDB-2009-003572 // PACKETSTORM: 78887 // CNNVD: CNNVD-200907-043 // NVD: CVE-2009-2305

CREDITS

Septemb0x and Stack

Trust: 0.3

sources: BID: 43788

SOURCES

db:OTHERid: -
db:BIDid:43788
db:JVNDBid:JVNDB-2009-003572
db:PACKETSTORMid:78887
db:CNNVDid:CNNVD-200907-043
db:NVDid:CVE-2009-2305

LAST UPDATE DATE

2025-04-10T22:10:17.232000+00:00


SOURCES UPDATE DATE

db:BIDid:43788date:2009-07-01T00:00:00
db:JVNDBid:JVNDB-2009-003572date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200907-043date:2009-07-02T00:00:00
db:NVDid:CVE-2009-2305date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:BIDid:43788date:2009-07-01T00:00:00
db:JVNDBid:JVNDB-2009-003572date:2012-06-26T00:00:00
db:PACKETSTORMid:78887date:2009-07-03T07:30:26
db:CNNVDid:CNNVD-200907-043date:2009-07-02T00:00:00
db:NVDid:CVE-2009-2305date:2009-07-02T10:30:00.530